ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Cryptographic Hash Based Security Protocol For Mobile Rfid - A Review

Journal: International Journal of Scientific & Technology Research (Vol.3, No. 4)

Publication Date:

Authors : ; ;

Page : 92-95

Keywords : Keywords RFID protocol; RFID tag; forward privacy; cryptographic hash function; security; IOT.;

Source : Downloadexternal Find it from : Google Scholarexternal


Abstract In the RFID systems privacy protection and integrity assurance become rather crucial because these RFID tags may have a wide range of transmission making them subject to unauthorized scanning by malicious readers and responsible for various other attacks. Da et alsRFID protocol overcome a forward privacy problem but assumed that communication channel between reader and database is secure which doesnt agree with the real development of IOT.Therefore to overcome the privacy weaknesses of RFID protocol in mobile environment an RFID security protocol based on the cryptographic hash function is design. The proposed work will increase security to certain extend as well as resistance to replay denial-of-service and man-in-the-middle attacks while retaining a competitive computation cost.

Last modified: 2015-06-28 03:54:56